Machine learning approaches to IoT security: A systematic literature review

R Ahmad, I Alsmadi - Internet of Things, 2021 - Elsevier
With the continuous expansion and evolution of IoT applications, attacks on those IoT
applications continue to grow rapidly. In this systematic literature review (SLR) paper, our …

Monitoring real time security attacks for IoT systems using DevSecOps: a systematic literature review

A Bahaa, A Abdelaziz, A Sayed, L Elfangary, H Fahmy - Information, 2021 - mdpi.com
In many enterprises and the private sector, the Internet of Things (IoT) has spread globally.
The growing number of different devices connected to the IoT and their various protocols …

Authentication techniques and methodologies used in wireless body area networks

M Hussain, A Mehmood, S Khan, MA Khan… - Journal of Systems …, 2019 - Elsevier
Wireless body area network (WBAN), got the IEEE standard in February 2012, is the most
significant and highly focused research area among researchers, academicians, and …

The use of multi-task learning in cybersecurity applications: a systematic literature review

S Ibrahim, C Catal, T Kacem - Neural Computing and Applications, 2024 - Springer
Cybersecurity is crucial in today's interconnected world, as digital technologies are
increasingly used in various sectors. The risk of cyberattacks targeting financial, military, and …

Application of deep learning for quality of service enhancement in internet of things: A review

N Kimbugwe, T Pei, MN Kyebambe - Energies, 2021 - mdpi.com
The role of the Internet of Things (IoT) networks and systems in our daily life cannot be
underestimated. IoT is among the fastest evolving innovative technologies that are digitizing …

Federated learning role in big data, jot services and applications security, privacy and trust in jot a survey

S Yarradoddi, TR Gadekallu - Trust, Security and Privacy for Big …, 2022 - taylorfrancis.com
The Internet of things or JOT is a large number of inter connected or interrelated devices that
share data through the internet without manual intervention. The data collected in JOT is …

[PDF][PDF] A lightweight Anomaly detection model using SVM for WSNs in IoT through a hybrid feature selection algorithm based on GA and GWO

A Davahli, M Shamsi, G Abaei - Journal of Computing and Security, 2020 - jcomsec.ui.ac.ir
As a result of an incredibly fast growth of the number and diversity of smart devices
connectable to the internet, commonly through open wireless sensor networks (WSNs) in …

Securing resource-constrained iot nodes: Towards intelligent microcontroller-based attack detection in distributed smart applications

A Shalaginov, MA Azad - Future Internet, 2021 - mdpi.com
In recent years, the Internet of Things (IoT) devices have become an inseparable part of our
lives. With the growing demand for Smart Applications, it becomes clear that IoT will bring …

Edge intelligence based mitigation of false data injection attack in iomt framework

SR Sankepally, N Kosaraju, V Reddy… - 2022 OITS …, 2022 - ieeexplore.ieee.org
IoMT is a networked infrastructure comprising services, software, hardware, and medical
equipment. By removing the need for in-person visits, this type of technology is improving …

A Study on the Efficiency of Intrusion Detection Systems in IoT Networks

S Seifi, R Beaubrun, M Bellaiche… - 2023 International …, 2023 - ieeexplore.ieee.org
Intrusion detection is one of the cornerstones of cyber defense. In order to prevent intruders
from gaining unauthorized access to Internet of Things (IoT) infrastructure, efficient intrusion …